Which of the following activities are usually looked for using passive intrusion-detection tools?
A) Unusual or excessive e-mail traffic
B) Changes to security
C) Unplanned system shutdowns
D) Port scans
E) All of the above
Correct Answer:
Verified
Q27: What type of intrusion detection monitors the
Q28: What are the three principle event logs
Q29: Which of the following network activities may
Q30: Which passive intrusion-detection tool monitors network activity
Q31: Gathering performance statistics each time a new
Q33: Which active intrusion-detection tool is a distributed
Q34: In the event log, what type of
Q35: Which active intrusion-detection tool monitors HTML activity
Q36: Which of the following options is a
Q37: Which type of intrusion detection system looks
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents